Detecting Insider Information Theft Using Features from File Access Logs

被引:0
|
作者
Gates, Christopher [1 ]
Li, Ninghui [1 ]
Xu, Zenglin [1 ]
Chari, Suresh N. [2 ]
Molloy, Ian [2 ]
Park, Youngja [2 ]
机构
[1] Purdue Univ, W Lafayette, IN 47907 USA
[2] IBM Res, Cambridge, MA USA
来源
关键词
file; access; insider threat; ANOMALY DETECTION; SYSTEM;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Access control is a necessary, but often insufficient, mechanism for protecting sensitive resources. In some scenarios, the cost of anticipating information needs and specifying precise access control policies is prohibitive. For this reason, many organizations provide employees with excessive access to some resources, such as file or source code repositories. This allows the organization to maximize the benefit employees get from access to troves of information, but exposes the organization to excessive risk. In this work we investigate how to build profiles of normal user activity on file repositories for uses in anomaly detection, insider threats, and risk mitigation. We illustrate how information derived from other users' activity and the structure of the filesystem hierarchy can be used to detect abnormal access patterns. We evaluate our methods on real access logs from a commercial source code repository on tasks of user identification and users seeking to leak resources by accessing more than they have a need for.
引用
下载
收藏
页码:383 / 400
页数:18
相关论文
共 50 条
  • [1] Detecting depression on video logs using audiovisual features
    Kyungeun Min
    Jeewoo Yoon
    Migyeong Kang
    Daeun Lee
    Eunil Park
    Jinyoung Han
    Humanities and Social Sciences Communications, 10
  • [2] Detecting depression on video logs using audiovisual features
    Min, Kyungeun
    Yoon, Jeewoo
    Kang, Migyeong
    Lee, Daeun
    Park, Eunil
    Han, Jinyoung
    HUMANITIES & SOCIAL SCIENCES COMMUNICATIONS, 2023, 10 (01):
  • [3] Detecting indicators of compromise in web applications using access logs
    Cernica, Ionut
    Popescu, Nirvana
    Craciunescu, Razvan
    2021 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING (IEEE BLACKSEACOM), 2021, : 382 - 386
  • [4] A Model for Illegal File Access Tracking Using Windows Logs and Elastic Stack
    Kim, Jisun
    Jo, Eulhan
    Lee, Sungwon
    Cho, Taenam
    JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2021, 17 (04): : 772 - 786
  • [5] Detecting Insider Threat from Behavioral Logs Based on Ensemble and Self-Supervised Learning
    Zhang, Chunrui
    Wang, Shen
    Zhan, Dechen
    Yu, Tingyue
    Wang, Tiangang
    Yin, Mingyong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [6] A New Method for Detecting Users Behavior from Web Access Logs
    Sahu, Deepti
    Soni, Rishi
    2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1003 - 1007
  • [7] Using Information in Access Logs for Large Scale Identity Linkage
    Jalali, Leila
    Kim, Sungchul
    Krishnamoorthy, Narayanan
    Biswas, Rahul
    2018 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2018, : 2906 - 2911
  • [8] Detecting Privacy Information Abuse by Android Apps from API Call Logs
    Ito, Katsutaka
    Hasegawa, Hirokazu
    Yamaguchi, Yukiko
    Shimada, Hajime
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2018, 2018, 11049 : 143 - 157
  • [9] Detecting Web Crawlers from Web Server Access Logs with Data Mining Classifiers
    Stevanovic, Dusan
    An, Aijun
    Vlajic, Natalija
    FOUNDATIONS OF INTELLIGENT SYSTEMS, 2011, 6804 : 483 - 489
  • [10] Going Beyond the Cookie Theft Picture Test: Detecting Cognitive Impairments Using Acoustic Features
    Braun, Franziska
    Erzigkeit, Andreas
    Lehfeld, Hartmut
    Hillemacher, Thomas
    Riedhammer, Korbinian
    Bayerl, Sebastian P.
    TEXT, SPEECH, AND DIALOGUE (TSD 2022), 2022, 13502 : 437 - 448